stronger security for reusable garbled circuits general
play

Stronger Security for Reusable Garbled Circuits, General Definitions - PowerPoint PPT Presentation

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal IIT Madras Garbled Circuits (Yao 86) Garble Circuit C: Garble(C; R) Encode Input x: Encode(x; R) Decode: ( ) = ( ) C x C x


  1. Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal IIT Madras

  2. Garbled Circuits (Yao 86) Garble Circuit C: Garble(C; R) Encode Input x: Encode(x; R) ˆ ˆ Decode: ( ) = ( ) C x C x ˆ ˆ Privacy: , reveal "nothing but" ( ) C x C x Secure for only one time use.

  3. Reusable Garbled Circuits [GKPVZ13] ˆ ˆ ˆ ˆ x x ˆ x x x 1 2 4 5 3 ˆ ˆ ˆ ˆ ˆ ˆ Decode: ( C x ), ( C x ),..... ( C x ) = ( C x ), C x ( ),..... ( C x ) 1 2 5 1 2 5 ˆ ˆ ˆ ˆ Privacy: , , C x x ,..... x reveal "nothing but" ( C x ), C x ( ),..... ( C x ) 1 2 5 1 2 5 First construction by Goldwasser et al in 2013

  4. Functional Encryption (FE) [Sahai-Waters’05 , BSW’12] Secret Key for Circuit C: KeyGen(SK, C) SK C Decrypt: SK C , CT x → C(x) Encrypt Input x: Privacy: CT x Nothing more Enc(PK, x) Œ Input/circuit hiding  Public/Private key Ž One/Many key Security

  5. FE from Standard Assumptions State of Art Suppose we: • Restrict Adversary to make only one query [GKPVZ13] • Restrict Adversary to make certain types of queries [GVW15] Then, have FE for all circuits

  6. FE from Standard Assumptions State of Art Suppose we: • Restrict Adversary to make only one query [GKPVZ13]: Reusable Garbled Circuits • Restrict Adversary to make certain types of queries [GVW15]: Predicate Encryption Then, have FE for all circuits

  7. Restricting Number of Queries: Reusable Garbled Circuits [GKPVZ13] • Adversary can request any one key of any type • Need circuit privacy, can be achieved in private key setting • Security breaks down for more than one circuit query, of any type • Can be generalized for bounded Q queries using GVW12. CT grows multiplicatively as O(Q 4 )

  8. Restricting Type of Queries: Predicate Encryption • (“Weak Attribute Hiding”) Adversary can request any number of “0-keys” i.e. C i such that C i (x 0 ) = C i (x 1 ) =0 • May not request even single C i s.t. C i (x 0 ) = C i (x 1 ) = 1 • Current systems [GVW15,AFV11] only achieve security in weak game, even for inner product predicate encryption [AFV11].

  9. Best Known 1 Queries 0 Queries Security Ciphertext Game query dep GKPVZ13 ≤ 1 1 - Selective (+ GVW12) (STOC, (Q with Mult. Q 4 2013) GVW12 compiler) GVW15 0 Any Selective No (CRYPTO 2015)

  10. Our Results 1 Queries 0 Queries Security Ciphertext Game query dep GKPVZ13 ≤ 1 1 - Selective (+ GVW12) (STOC, (Q with Mult. Q 4 2013) GVW12 compiler) GVW15 0 Any Selective No (CRYPTO 2015) This Any Fixed Any Semi- Additive Q Adaptive Q 2

  11. Additionally… • We show that prior constructions (AFV11, GVW15) supporting only 0 keys are totally insecure if attacker allowed 1 keys • Constant number of 1 keys sufficient to completely break security • Applies even to inner product functional encryption (AFV11) .

  12. Attacks • Three attacks: – CT and SK structure: applies even to inner product encryption [AFV11] – Ciphertext evaluation method of [BGG+14] – “Lazy-OR” trick of GVW15 which leaks FHE noise • Are they surprising?

  13. Learning With Errors è Ciphertext Distinguish “noisy inner products” from uniform s + e A A , versus A Unif ,

  14. SIS Problem è Secret Key Given matrix A, find “short” z such that A z = 0 mod q A = 0 mod q z Many short vectors form a trapdoor for A Can be used to break LWE with matrix A

  15. Decryption works CT s + e A when matrices match SK A = 0 z

  16. Attack # 1 • Request keys for linearly dependent vectors • Combine keys to get short vectors, hence trapdoor in certain lattice A* • Manipulate challenge CT to get LWE sample with matrix B* • A* and B* only match for decrypting keys • Lessons: Inherent vulnerability for “attribute hiding” scheme with this structure

  17. Attack # 2 • Regardless of circuit complexity, decryption leaks linear function of noise terms. • Given few decrypting keys, attacker can recover noise terms, LWE secret, hence all attributes. • Lessons: Inherent asymmetry between 0 and 1 queries in this method of evaluation.

  18. Construction • Extend Predicate encryption to subsume reusable garbled circuits. • Yields new construction of reusable garbled circuits with stronger security than GKPVZ13 – Support for 0 queries for free – Semi-adaptive rather than selective • New techniques – Handle 1 and 0 queries differently in simulation – Program public parameters based on key to be requested in future • Extend to bounded key FE: better ciphertext size, weaker security game

  19. Construction PE (GVW15) PE + RGC PE+RGC with Extend to with one with very semi- support Q sided selective adaptive arbitrary security security Very security New queries New Selective tricks method to semi plus adaptive more careful proof Very Selective: Adv must announce challenge message as well as function key request at start of game Semi-adaptive: Adv may see public parameters before outputting challenge

  20. (Very) Selective to Semi-Adaptive Security • Nest selectively secure scheme Sel within adaptively secure FE for linear functions. • Generate ciphertexts for very selective game on the fly

  21. (Very) Selective to Semi-Adaptive • Let LinFE be FE scheme so that – Decrypt ( CT(x), SK(y)) = <x;y> • ALS16 give construction of LinFE with adaptive security • Structure of Sel ciphertext C i = (A i + x i G) T s + noise May be written as inner product of vectors (A i T , G T , I ) and (s, x i s, noise)

  22. (Very) Selective to Semi-Adaptive • Encryptor provides LinFE CT for (s, x i s, noise) • KeyGen provides both SK for: – FeLin.SK (A i T , G T , I ) – Sel.SK (y). • Decrypt – Compute Sel.CT(x) via LinFE decryption – Compute Sel decryption using Sel.CT(x), Sel.SK (y)

  23. Conclusion • New construction of reusable garbled circuits with stronger security • New method for compiling very selective to semi adaptive security for lwe based systems • Attacks on existing predicate encryption systems: codify barrier in generalization to FE • Generalize to handle Q queries :better CT size than GVW12, but weaker security game. Thank you!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend